1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
13

Sheila is using a process of saving files to her desktop and then renaming them. She is

Computers and Technology
2 answers:
inessss [21]3 years ago
5 0

Answer: D

Use the internet to search for a new app to rename the folder.​

Explanation:

Rename function is used to change the name of the file or directory i.e. from old_name to new_name without changing the content present in the file. This function takes name of the file as its argument. There are many alternatives to this in which Sheila can found out through the internet.

ra1l [238]3 years ago
4 0

Answer:

d.Use the internet to search for a new app to rename the folder.​

Explanation:

This is the best option and is the most time effective option in this case. There are tonnes of apps that are used for renaming files on the internet.

You might be interested in
HELP PLSSSSS!!! I WILL MARK BRAINLIEST FOR THE FIRST AND CORRECT ANSWER!!!
dalvyx [7]
The answer you are looking for would be A. Hardware can be an external tool, where as software is an internal tool. Hope this helped!
6 0
3 years ago
Read 2 more answers
Which best compares and contrasts visual and performing arts? Both careers use communication skills; however, people involved in
Vlad1618 [11]

Answer:

Both careers speak to an audience; however, people involved in the performing arts speak only to a live audience.

Explanation:

sorry im late but im not sure

3 0
3 years ago
Read 2 more answers
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Lots of data can be transferred in short time, when we have,
dusya [7]

Answer: B. Higher Bandwidth

8 0
2 years ago
Read 2 more answers
All margins of a report are _____ inch. *<br><br> 1<br> 2<br> 3<br> 4
MA_775_DIABLO [31]

Answer:

The answer is "1 inch"

Explanation:

The margin is also known as space, it is the distance between the document 's text and edge. In default, its distance is 1, and it also allows you to customize, the new document, which is set to standard.

  • In other words, we can say that it implies the one-inch gap between the text and each edge, which is based on your specifications.
  • It also allows you to customize the margin size of the document, and other choices were wrong because it is the customize size.

6 0
3 years ago
Other questions:
  • 50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
    10·2 answers
  • Which of the following can be created when two tables contain a common field?
    14·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • Which of the following is an example of new and emerging classes of software?
    11·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • In your opinion, what is an example of an innovative solution to an engineering problem? Explain briefly why you chose this answ
    9·1 answer
  • When a new word processing software program is released, companies that might use it must consider not only the cost of buying i
    13·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • How do most business applications and websites process credit card transactions?
    13·1 answer
  • 15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!